虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

leave

  • Symbian 内存泄露检查及调式教程

    Symbian 内存泄露检查及调式教程,Using Hooklogger to find out where a leave() came from

    标签: Symbian 内存 教程

    上传时间: 2013-12-25

    上传用户:stampede

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • isual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirement

    isual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirements - Use customchatdev.html for developing / testing - Create .jar and .cab-files containing client-specific .class-files and the images-folder (use zip and cabarc compressing tools) - Adapt the customchat.html file - Upload all the files to your webserver - Start the ChatServer by invoking java at.ac.uni_linz.tk.vchat.ChatServer [port [server-key]] from your commandline - I kindly ask you to leave copyright and credit information in the InfoPanel.class as it is - but you are invited to add your own text. In case of violations I will consider excluding this class from the source in the future.

    标签: Chat requirement Developer Customize

    上传时间: 2017-01-27

    上传用户:iswlkje

  • one of video tool Skype only in windows mobile5.0 more than running, but my task is to let it run S

    one of video tool Skype only in windows mobile5.0 more than running, but my task is to let it run Skype in WINCE only in windows mobile5.0 more than running, but my task is to let it run in WINCE . leave no stone unturned when I can not get windows mobile, they thought would be needed for skype all library files to my WINCE, so perhaps will be able to run skype. 1. Used depend Show skype depends on which files. In fact, not many documents, I can remember only under the following: core.dllcommctr.dllaygeshell.dllhtmlview.dll In addition to htmlview.dll, the other documents in WINCE have (if your system does not, please IMAGE Canada on the corresponding module). Therefore, I find on the Internet htmlview.dll, the results really find

    标签: running windows mobile Skype

    上传时间: 2014-01-17

    上传用户:miaochun888

  • The+LTE-SAE+Deployment+Handbook

    Long-TermEvolution(LTE)isarguablyoneofthemostimportantstepsinthecurrentphaseof the development of modern mobile communications. It provides a suitable base for enhanced services due to increased data throughput and lower latency figures, and also gives extra impetus to the modernization of telecom architectures. The decision to leave the circuit- switched domainoutofthescope ofLTE/SAEsystem standardization might soundradical but itindicatesthatthetelecomworldisgoingstronglyfortheall-IPconcept----andthedeployment of LTE/SAE is concrete evidence of this global trend.

    标签: Deployment Handbook LTE-SAE The

    上传时间: 2020-06-01

    上传用户:shancjb

  • 代码大全Steve McConnell著 919页高清文字版

    软件开发人员必备工具书,,目录如下Welcome to Software Construction [1]1.1 What Is Software Construction?1.2 Why Is Software Construction Important?1.3 How to Read This Book......7.1 Valid Reasons to Create a Routine7.2 Design at the Routine Level7.3 Good Routine Names7.4 How Long Can a Routine Be?7.5 How to Use Routine Parameters7.6 Special Considerations in the Use of Functions7.7 Macro Routines and Inline RoutinesDefensive Programming [5.6 + new material]8.1 Protecting Your Program From Invalid Inputs8.2 Assertions8.3 Error Handling Techniques8.4 Exceptions8.5 Barricade Your Program to Contain the Damage Caused by Errors8.6 Debugging Aids8.7 Determining How Much Defensive Programming to leave in Production Code8.8 Being Defensive About Defensive ProgrammingThe Pseudocode Programming Process [4+new material]9.1 Summary of Steps in Building Classes and Routines9.2 Pseudocode for Pros9.3 Constructing Routines Using the PPP9.4 Alternatives to the PPP......

    标签: 代码大全 软件开发

    上传时间: 2021-12-08

    上传用户:20125101110